Security Risk, Strategy & Governance - Templates & Policies

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Information Security Steering Committee RACI Chart

Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us